Static task
static1
Behavioral task
behavioral1
Sample
08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3.exe
Resource
win10v2004-20231215-en
General
-
Target
08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3
-
Size
410KB
-
MD5
07a8b8bcf8c3d0279fd2a726cf6a8367
-
SHA1
03fb0093ec38801c4874569451f67b23ec8b05b2
-
SHA256
08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3
-
SHA512
5fe460135a9f46d0095d705b482625b3326b880f9d1499e87445ed527604b76fbc5f13c1d5b114db105af07cc5a62c8b944286aa75762a5f21aedf209d88910f
-
SSDEEP
6144:qn7dHFax/3dAE9quLl3slpO3x/uUdaYTAONT+ydR5ZfMuluK:gdHFap3dAE9qDPW9daM3f5ZfhEK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3
Files
-
08c0d4247c8db8d0e231c5db121e1325d0f9f6b54bd4c0febea2e3167f9b08c3.exe windows:6 windows x86 arch:x86
e4b566a3e6a133b7573094fec4c2c271
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
BeginPaint
FindWindowA
RegisterWindowMessageW
PostQuitMessage
KillTimer
FindWindowW
GetWindowThreadProcessId
DefWindowProcW
GetMessageA
SetPropA
PostMessageW
DispatchMessageA
LoadCursorA
SetWindowPos
keybd_event
PostMessageA
CreateWindowExW
SendMessageW
RegisterClassExW
IsWindow
TranslateAcceleratorA
SetTimer
SetWindowsHookExA
LoadAcceleratorsA
UnhookWindowsHookEx
ChangeWindowMessageFilter
TranslateMessage
EndPaint
ole32
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantInit
VariantClear
kernel32
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentProcess
WaitForSingleObject
GetModuleHandleA
OpenProcess
Sleep
CloseHandle
LoadLibraryW
K32EnumProcesses
SetCurrentDirectoryW
GetProcAddress
FreeLibrary
QueryFullProcessImageNameW
IsWow64Process
DeleteFileW
GetCurrentThreadId
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
WriteConsoleW
GetModuleHandleW
GetCPInfo
HeapFree
HeapAlloc
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
CreateFileW
FlushFileBuffers
HeapSize
SetEndOfFile
GetModuleFileNameW
ExitProcess
ReadFile
GetModuleHandleExW
FreeLibraryAndExitThread
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
shell32
ShellExecuteA
ShellExecuteW
advapi32
CreateServiceW
CloseServiceHandle
OpenSCManagerW
DeleteService
ControlService
StartServiceW
OpenServiceW
shlwapi
PathRemoveFileSpecW
PathRemoveBackslashW
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ